Surveys & Reports

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Fusce augue justo, viverra at luctus vitae, dapibus eu odio. Morbi vestibulum orci neque, vulputate pharetra purus fringilla in.

Most Mobile Devices are Vulnerable to Attack
Most Mobile Devices are Vulnerable to Attack

Mobile threats are on the rise. When mobile devices first started to hit mass adoption, there were a lot of fears over malware and exploits. At first, those threats failed to materialized, and both individuals and organizations alike became complacent about the risks to mobile devices. Today, mobile devices are one of the top threats to organizational data security.

READ MORE
Requirements for Protecting the Endpoint in Australia: Understanding the Law
Requirements for Protecting the Endpoint in Australia: Understanding the Law

Safeguarding endpoint devices poses enormous challenges for organizations: the volume and variety of devices in use by employees, the lack of control over end-user behaviour, and the growing number of risks introduced on the endpoint. Not only is the endpoint contributing to a growing attack surface, but regular daily activities on endpoint devices are putting data at risk in a variety of ways. In recognition of the growing threat...

READ MORE
The Three Faces of Insider Threat
The Three Faces of Insider Threat

The Insider Threat comes in all shapes and sizes, making it a hard nut to crack for IT. Virtually anyone with approved access to your corporate network or data stores is an Insider. Traditional methods to protect data, such as encryption, become meaningless. An insider is already authorized to bypass these measures and access sensitive data. How do you protect your organization against the Insider Threat? The first step...

READ MORE
Why The Gatekeepers are Gatecrashers in IT
Why The Gatekeepers are Gatecrashers in IT

In our report, IT Confidential: The State of Security Confidence, we uncovered some surprising truths about the Insider Threat. In particular, our report revealed that those tasked with protecting data, the “gatekeepers,” were often responsible for putting it at risk. The question, then, is Why are the IT ‘gatekeepers’ becoming ‘gatecrashers’?

READ MORE
IT Professionals Share Bad Habits in New Absolute Survey
IT Professionals Share Bad Habits in New Absolute Survey

One-third (33%) of IT managers admit to successfully hacking their own or another organization. Nearly half of IT managers (45%) knowingly circumvent their own security policies. IT personnel are not following the same security protocols they’re expected to enforce. We revealed these results today in our new report, IT Confidential: The State of Security Confidence, which provides insight into the attitudes, behaviour, and confidence levels of IT when it...

READ MORE